An Analysis of Cybersecurity Challenges in Public Cloud and Appropriate Intrusion Detection Mechanisms.

  • Unique Paper ID: 170915
  • PageNo: 2282-2291
  • Abstract:
  • This research study provides a review of cyber threats and a variety of effective intrusion detection methods that can be adopted to mitigate some of these threats when using public cloud environments. The research deals with an extensive review of the literature, assessment of various threats to security, as well as the evaluation of different intrusion detection systems (IDS). Also, it has recommendations for the improvement of cloud security.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{170915,
        author = {Prakhar Srivastava and Pranjal Agrawal},
        title = {An Analysis of Cybersecurity Challenges in Public Cloud and Appropriate Intrusion Detection Mechanisms.},
        journal = {International Journal of Innovative Research in Technology},
        year = {2024},
        volume = {11},
        number = {7},
        pages = {2282-2291},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=170915},
        abstract = {This research study provides a review of cyber threats and a variety of effective intrusion detection methods that can be adopted to mitigate some of these threats when using public cloud environments. The research deals with an extensive review of the literature, assessment of various threats to security, as well as the evaluation of different intrusion detection systems (IDS). Also, it has recommendations for the improvement of cloud security.},
        keywords = {},
        month = {December},
        }

Cite This Article

Srivastava, P., & Agrawal, P. (2024). An Analysis of Cybersecurity Challenges in Public Cloud and Appropriate Intrusion Detection Mechanisms.. International Journal of Innovative Research in Technology (IJIRT), 11(7), 2282–2291.

Related Articles